Home Malware News Top 5 Malware Types for 2013: Ransomware, Trojans, Rogue Anti-Spyware Apps and More

Top 5 Malware Types for 2013: Ransomware, Trojans, Rogue Anti-Spyware Apps and More

Posted: January 31, 2013

malware threats in 2013We have already made assessments of what to expect in the year 2013 when it comes to new emerging scams and how to help prevent identity theft. The top malware threats to be on the lookout for in 2013 will go hand-in-hand with keeping yourself and your own family protected as we delve into a new year with new types of malware threats.

Top 5 Malware Threat Types to Lookout for in 2013

Top Malware Type #1: Ransomware

We have seen an onslaught of new malware that didn't use to exist many years ago, or it existed in milder forms. The new emergence of ransomware, a type of threat message that claims to come from a local police or law enforcement agency making false allegations of detecting illegal activity on one's computer, has been at the forefront of malware for 2013 thus far. Additionally, the evolution of Trojans and state-sponsored malware has increased steam pressure as it looks a derail its targets and potential victims this year. So far many new vicious ransomware threats have carried on the tradition of exploiting computer users based on the methods of popularized threats, such as FBI Moneypak Ransomware, Reventon Ransomare and Ukash Virus.

Top Malware Type #2: Trojans

Trojans, for some time, have been the root cause for a large percentage of malware. It has been estimated by security firm BitDefender, that 83% of malware infections around the world are of a Trojan-type. With Trojans having the ability to carry out malicious behavior on infected systems, sometimes through receiving updated instructions from a controller host, makes Trojan-type malware almost limitless. Moreover, there have been an excess of common banking Trojans running ramped over the course of the past 5 years, such as Zeus Trojan, Kooface and Conficker. Many of these Trojans acting as a botnet, where a group of compromised systems where updated through the infection to carry out pre-defined actions over the internet. Rootkits are more of a stubborn type of Trojan that has proven time after time to be ridiculously difficult to remove. Specialized anti-spyware applications are necessary to remove such threats. The goal of these Trojans, like other well-known malware threats, is to compromise computers to steal stored data, gain access to online accounts and even extort money from unsuspecting computer users.

Top Malware Type #3: Mobile Malware

In today's mobile-friendly world where just about everyone has some type of smart phone, it is inevitable that we will see a new rash of mobile malware this year. Much of the mobile malware that we have seen has been comprised of attacks through freely distributed apps. Many of the maliciously-tainted apps are available through grassroots or 3rd party app stores on the Internet. Most of these apps so far have mainly targeted smartphones running the Android OS, however, it does not completely leave out the iPhone's iOS as malware creators look to other web-based avenues to infect such systems. The case for no readily available anti-malware solution for smartphone platforms is another underlying issue with the spread of mobile malware.

Top Malware Type #4: Drive-by Exploits

A drive-by-exploitation is not exactly a type of malware, but more so the behavior of particular malware. Drive-by-exploits usually take place through a compromised or hacked website that infects computers through malicious code activated when a visitor clicks on an infected link or window. This method is known to infect systems with Trojan horse threats and other popular malware. The drive-by method is also a crafty way of attacking smart phones, which naturally access the internet much like a computer at home or work. At the massively growing rate of mobile devices, including smart phones and tablet or pad-type computers, drive-by-exploits may become the choice method for hackers spreading new malware creations in 2013.

Top Malware Type #5: Rogue Security Applications (rogue antispyware/rogue antivirus)

Fake security programs, or what we technically refer to as rogue anti-spyware and rogue anti-virus programs, have been a serious threat for several years now. With new types of malware on the horizon for 2013, rogue anti-spyware and rogue anti-virus programs are still a viable threat. We expect to see a level playing field with such applications during 2013, while other malware takes more of a front seat. Though, rogue security programs are always showing their face every chance hackers get to explore old familiar avenues.

Of course with any given year, it will develop its trends for emerging malware types. Outdated software and a vulnerable system not running any type of anti-spyware software, are always holes that end-users lack to seal up. Attacks such as recent Java or Flash exploits thrive on the very idea of how unprotected some computers are. With whatever 2013 brings in terms of malware, it is always best to put yourself in the optimal position to combat new malware by keeping all software updated, run a trusted anti-spyware application and avoid untrusted sources on the Internet.

Loading...